Stebėti
Xiaoyang Dong
Xiaoyang Dong
Associate Professor, Tsinghua University
Patvirtintas el. paštas tsinghua.edu.cn
Pavadinimas
Cituota
Cituota
Metai
Machine learning assisted differential distinguishers for lightweight ciphers
A Baksi, J Breier, Y Chen, X Dong
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021
1092021
Quantum key-recovery attack on Feistel structures
X Dong, X Wang
Science China Information Sciences 61 (10), 102501, 2018
982018
Quantum cryptanalysis on some generalized Feistel schemes
X Dong, Z Li, X Wang
Science China Information Sciences 62 (2), 22501, 2019
872019
Quantum attacks on some Feistel block ciphers
X Dong, B Dong, X Wang
Designs, Codes and Cryptography 88 (6), 1179-1203, 2020
862020
MILP-based differential attack on round-reduced GIFT
B Zhu, X Dong, H Yu
Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019
812019
Conditional cube attack on round-reduced ASCON
Z Li, X Dong, X Wang
IACR Transactions on Symmetric Cryptology, 2017(1), 175-202, 2017
802017
Quantum collision attacks on AES-like hashing with low quantum random access memories
X Dong, S Sun, D Shi, F Gao, X Wang, L Hu
Advances in Cryptology–ASIACRYPT 2020: International Conference on the …, 2020
732020
Improved conditional cube attacks on Keccak keyed modes with MILP method
Z Li, W Bi, X Dong, X Wang
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
542017
Meet-in-the-middle attacks revisited: Key-recovery, collision, and preimage attacks
X Dong, J Hua, S Sun, Z Li, X Wang, L Hu
Advances in Cryptology – CRYPTO 2021: Annual International Cryptology …, 2021
512021
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
B Zhao, X Dong, W Meier, K Jia, G Wang
Designs, Codes and Cryptography 88 (6), 1103-1126, 2020
482020
Key guessing strategies for linear key-schedule algorithms in rectangle attacks
X Dong, L Qin, S Sun, X Wang
Advances in Cryptology – EUROCRYPT 2022: Annual International Conference on …, 2022
442022
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
Z Bao, X Dong, J Guo, Z Li, D Shi, S Sun, X Wang
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
412021
New related-tweakey boomerang and rectangle attacks on Deoxys-BC including BDT effect
B Zhao, X Dong, K Jia
IACR Transactions on Symmetric Cryptology, 121-151, 2019
402019
Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny
L Qin, X Dong, X Wang, K Jia, Y Liu
IACR Transactions on Symmetric Cryptology, 249-291, 2021
392021
Collision attacks on round-reduced gimli-hash/ascon-xof/ascon-hash
R Zong, X Dong, X Wang
Cryptology ePrint Archive, 2019
382019
A key-recovery attack on 855-round Trivium
X Fu, X Wang, X Dong, W Meier
Advances in Cryptology – CRYPTO 2018: Annual International Cryptology …, 2018
362018
Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia
L Li, K Jia, X Wang, X Dong
International Workshop on Fast Software Encryption, 48-70, 2015
342015
Cube-like attack on round-reduced initialization of Ketje Sr
X Dong, Z Li, X Wang, L Qin
IACR Transactions on Symmetric Cryptology, 259-280, 2017
332017
Milp-aided related-tweak/key impossible differential attack and its applications to qarma, joltik-bc
R Zong, X Dong
IEEE Access 7, 153683-153693, 2019
272019
Towards key-recovery-attack friendly distinguishers: Application to GIFT-128
R Zong, X Dong, H Chen, Y Luo, S Wang, Z Li
IACR Transactions on Symmetric Cryptology, 156-184, 2021
242021
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20